Analyzing Website privacy requirements using a privacy goal taxonomy, Proceedings IEEE Joint International Conference on Requirements Engineering, 2002. ,
DOI : 10.1109/ICRE.2002.1048502
Why we can't be bothered to read privacy policies models of privacy economics as a lemons market, Proceedings of the 5th international conference on Electronic commerce , ICEC '03, pp.403-407, 2003. ,
DOI : 10.1145/948005.948057
Specifying privacy policies with P3P and EPAL, Proceedings of the 2004 ACM workshop on Privacy in the electronic society , WPES '04, 2004. ,
DOI : 10.1145/1029179.1029190
Individual Management of Personal Reachability in Mobile Communication, Information Security in Research and Business ; Proceedings of the IFIP TC11 13th international conference on Information Security (SEC'97), pp.164-174, 1997. ,
DOI : 10.1007/978-0-387-35259-6_14
Privacy- Friendly LBS: A Prototype-supported Case Study, 13th Americas Conference on Information Systems (AMCIS), 2007. ,
Privacy Policy Referencing," in Trust, Privacy and Security in Digital Business, pp.129-140, 2010. ,
Status quo bias in decision making, Journal of Risk and Uncertainty, vol.32, issue.1, pp.7-59, 1988. ,
DOI : 10.1017/CBO9780511809477
URL : http://dtserv2.compsy.uni-jena.de/ss2009/sowpsy_ue/20354393/content.nsf/pages/f0cc3cae039c8b42c125757b00473c77/$file/samuelson_zeckhauser_1988.pdf
A Review and Taxonomy of Choice Architecture Techniques, Journal of Behavioral Decision Making, vol.97, issue.7, pp.511-524, 2016. ,
DOI : 10.1016/j.obhdp.2005.03.001
A Bargaining Model Based on the Commitment Tactic, Journal of Economic Theory, vol.69, issue.1, pp.134-152, 1996. ,
DOI : 10.1006/jeth.1996.0041
Building online trust through privacy practices, International Journal of Information Security, vol.42, issue.1, pp.323-331, 2007. ,
DOI : 10.5465/AMR.1996.27003216
On the Internet of Things, Trust is Relative, Constructing Ambient Intelligence, pp.267-273, 2012. ,
DOI : 10.1007/978-3-642-31479-7_46
Consumer trust, perceived security and privacy policy, Industrial Management & Data Systems, vol.106, issue.5, pp.601-620, 2006. ,
DOI : 10.1108/07363769910260515
On-line privacy and consent, Proceedings of the 2010 workshop on New security paradigms, NSPW '10, 2010. ,
DOI : 10.1145/1900546.1900560
Examining Behavioral Processes in Indecision: Decisional Procrastination and Decision-Making Style, Journal of Research in Personality, vol.34, issue.1, pp.127-137, 2000. ,
DOI : 10.1006/jrpe.1999.2247
Privacy policies as decision-making tools, Proceedings of the 2004 conference on Human factors in computing systems , CHI '04, 2004. ,
DOI : 10.1145/985692.985752
Are key account relationships different? Empirical results on supplier strategies and customer reactions, Industrial Marketing Management, vol.36, issue.4, pp.470-482, 2007. ,
DOI : 10.1016/j.indmarman.2005.12.007
Availability and quality of mobile health app privacy policies, Journal of the American Medical Informatics Association, vol.22, pp.1-4, 2014. ,
DOI : 10.1136/amiajnl-2013-002605
URL : https://academic.oup.com/jamia/article-pdf/22/e1/e28/5173337/amiajnl-2013-002605.pdf
Examining Internet Privacy Policies Within the Context of User Privacy Values, IEEE Transactions on Engineering Management, vol.52, issue.2, pp.227-237, 2005. ,
DOI : 10.1109/TEM.2005.844927